Proposed Change:
New countermeasures:
Encourage vendor use of device architectures that limit trust between the baseband processor and application processor.
Encourage vendor use of device architectures that limit trust of entities posing as the wireless carrier.
General Comment
Threat ID: STA-18 Type of Comment: T
Proposed Change: New countermeasures: Encourage vendor use of device architectures that limit trust between the baseband processor and application processor. Encourage vendor use of device architectures that limit trust of entities posing as the wireless carrier.
New exploit reference https://www.blackhat.com/docs/us-14/materials/us-14-Solnik-Cellular-Exploitation-On-A-Global-Scale-The-Rise-And-Fall-Of-The-Control-Protocol.pdf
Justification: workshop suggestions